mailing list archives
Questionable security policies in Outlook 2002
From: "Richard M. Smith" <rms () computerbytesman com>
Date: Wed, 20 Mar 2002 18:11:33 -0500
I have found a number of questionable security policies in Outlook 2002
which allow the "bad guys" to bypass some of the security features which
where introduced in the Outlook security patch. These problems likely
affect earlier versions of Outlook as well as Outlook Express.
Here is the list of problems:
Problem #1: In an HTML email message, Outlook will automatically
download an executable file from a Web site whose URL is specified in an
IFRAME tag embedded in the message. The download happens when the email
message is read. Outlook will put up a dialog box asking a user if they
want to open the file (i.e., run the executable), save it, or cancel the
download. There is no security warning that the executable file might
be dangerous. Unfortunately, the default action of the dialog is
Recommendation: IFRAMEs should be restricted to HTML, image, and text
files. If an IFRAME attempts to download another kind of file, then the
file should be discarded. Outlook 2002 already discards executable
files attached to an email message, so it should do the same thing with
executable files in IFRAMEs. The dialog message is particularly
confusing in Outlook since a user never initiated the download in the
first place. (As a side note, Hotmail already offers this protection.)
executed in spite of the fact that scripting is turned off by default in
executed. In Outlook, URLs are limited to about 2,000 characters which
is probably enough space to contain a simple worm which could exploit
one of the known Internet Explorer security holes.
Outlook. (As a side note, Hotmail already offers this protection.)
Problem #3: Cookies can be set and read in HTML email messages in spite
of the fact that the default security settings in Outlook 2002 claim
that cookies are turned off. This is a privacy leak problem and not a
security hole. For information of the implications of this leak, see
Recommendation: This is a software bug that just needs to be fixed.
Problem #4: The Outlook and the Internet Explorer (IE) development
groups at Microsoft just can't seem to agree how dangerous .URL files
are. The Outlook group sees them as security threat, while the IE group
does not. This disagreement makes the "Send a Link" command in IE
cumbersome and confusing to use. If one emails a friend the link of a
Web page using the command, IE generates an email message with the link
in the body of the email message plus a second copy of the link in an
attached .URL file. When the message is sent, Outlook proceeds to
generate an annoying "security" warning dialog box saying that the
attached .URL file might be dangerous. How a link to a Web page can be
dangerous is mystery to me. The only option is to send the message with
the "dangerous" .URL or abort the send. Outlook doesn't appear to have
any method for removing a "dangerous" .URL file from an outgoing
When I spoke to Microsoft about this particular issue last year, I was
told that the Outlook group is concerned that a .URL file might point to
a .EXE file instead of a Web page. The "bad guys" could use a .URL file
then to download and run malicious executables.
Recommendation: There are two solutions to this battle between the
Outlook and IE groups. Either IE should stop generating .URL files in
email messages or Outlook should be smarter about its handling of them.
For example, Outlook can safely allow through a .URL file that points to
a Web page, but reject ones that point to an executable file. Something
needs to be done here because the current operation of the "Send a link"
command is very confusing because Outlook is constantly "crying wolf".
I brought all of these issues to Microsoft's attention over the last 12
months. I am not sure what Microsoft's plan are for addressing them.
Problem #1 seems most critical.
Richard M. Smith
- Questionable security policies in Outlook 2002 Richard M. Smith (Mar 21)